Results 51 to 60 of about 134,362 (311)
Classification of Elements in Elliptic Curve Over the Ring đ˝q[É]
Let đ˝q[É] := đ˝q [X]/(X4 â X3) be a finite quotient ring where É4 = É3, with đ˝q is a finite field of order q such that q is a power of a prime number p greater than or equal to 5.
Selikh Bilel+2 more
doaj +1 more source
ED25519: A New Secure Compatible Elliptic Curve for Mobile Wireless Network Security
Wireless Sensor Networks (WSNs) create various security threats such as application variance in different sectors along with the model of cryptographic primitive and necessity.
MAUSAM DAS, Zenghui Wang
doaj +1 more source
Ranks of elliptic curves with prescribed torsion over number fields [PDF]
We study the structure of the Mordell--Weil group of elliptic curves over number fields of degree 2, 3, and 4. We show that if $T$ is a group, then either the class of all elliptic curves over quadratic fields with torsion subgroup $T$ is empty, or it contains curves of rank~0 as well as curves of positive rank.
arxiv +1 more source
Bilinear pairings on elliptic curves [PDF]
We give an elementary and self-contained introduction to pairings on elliptic curves over finite fields. The three different definitions of the Weil pairing that can be found in the literature are stated and proved to be equivalent using Weil reciprocity. Pairings with shorter loops, such as the ate, ate _i
openaire +6 more sources
Multiâinstitutional study on image quality for a novel CBCT solution on Oâring linac
Abstract Introduction This work presents a multiâinstitutional study on image quality provided by a novel cone beam computed tomography (CBCT). The main goal is to investigate the consistency of imaging performance across multiple institutions.
Luis AgullesâPedrĂłs+11 more
wiley +1 more source
Elliptic Curve Lightweight Cryptography: A Survey
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in industry and academy from different perspectives. Some of these aspects include mathematical foundations, protocol design, curve generation, security proofs ...
Carlos Andres Lara-Nino+2 more
doaj +1 more source
The remote authentication scheme is a cryptographic protocol incorporated by userâserver applications to prevent unauthorized access and security attacks.
Fairuz Shohaimay, Eddie Shahril Ismail
doaj +1 more source
A review of artificial intelligence in brachytherapy
Abstract Artificial intelligence (AI) has the potential to revolutionize brachytherapy's clinical workflow. This review comprehensively examines the application of AI, focusing on machine learning and deep learning, in various aspects of brachytherapy.
Jingchu Chen+4 more
wiley +1 more source
A note on log-algebraicity on elliptic curves [PDF]
We analyze log-algebraic power series identities for formal groups of elliptic curves over $\mathbb{Q}$ which arise from modular parametrizations. We further investigate applications to special values of elliptic curve $L$-functions.
arxiv
Abstract Purpose Due to the tight curvature in their design, ring applicators are usually associated with large positioning errors. The standard practice to correct for these deviations based on global offsets may not be sufficient to comply with the recommended tolerance.
Leon G. Aldrovandi+3 more
wiley +1 more source